Posts tagged “hacking”

ChittahChattah Quickies

  • Seen Reading – a "literary voyeruism blog" set mostly (I believe) in Toronto – What is Seen Reading?

    1. I see you reading.
    2. I remember what page you’re on in the book.
    3. I head to the bookstore, and make a note of the text.
    4. I let my imagination rip.
    5. Readers become celebrities.
    6. People get giddy and buy more books.

    Why do you do this?
    Readers are cool. Authors work hard. Publishers take chances. And you all deserve to be seen!

    (Thanks Suzanne Long!)

  • Choose What You Read NY – Choose What You Read NY is a non profit organization that offers free books to New Yorkers, encouraging its residents to read more, giving them an alternative to the free papers that get tossed out and even the digi-trash that crowds our time. In doing so, we help to recycle used books that would have unfortunately been thrown away.

    You will find us near major subway stations on the first Tuesday of each month.The idea is that once someone is finished with a book, they either drop it off in one of our conveniently located drop boxes or back to us at a station. Unlike a library, there will be no due dates, penalties, fees or registrations. We only ask that you return it once you are done so that the same book can be enjoyed by another commuter.

  • What was the last book, magazine and newspaper you read on the subway? – 6000 people respond and the New York Times posts the results
  • How and what people read on the New York City subways – Plenty of detailed examples of people, their books, and their travels: "Reading on the subway is a New York ritual, for the masters of the intricately folded newspaper, as well as for teenage girls thumbing through magazines, aspiring actors memorizing lines, office workers devouring self-help inspiration, immigrants newly minted — or not — taking comfort in paragraphs in a familiar tongue. These days, among the tattered covers may be the occasional Kindle, but since most trains are still devoid of Internet access and cellphone reception, the subway ride remains a rare low-tech interlude in a city of inveterate multitasking workaholics. And so, we read.

    There are those whose commutes are carefully timed to the length of a Talk of the Town section of The New Yorker, those who methodically page their way through the classics, and those who always carry a second trash novel in case they unexpectedly make it to the end of the first on a glacial F train."

    (thanks Avi and Anne)

  • Lego grabs ahold of customers with both hands – From 2006, great Wired piece about Lego's approach to involving ardent fans/customers in developing future products.
  • Noting:books – the simple yet dynamic way to track your reading, from the dates you start and finish a book, to your thoughts along the way.
  • CourseSmart brings textbooks to the iPhone in PDF; major readability challenges ensue – “It’s not the first place to go to read your textbook,” Mr. Lyman said of the iPhone app. But he said that it could be helpful if “you’re standing outside of the classroom, the quiz is in 10 minutes, and you want to go back to that end-of-chapter summary that helped you understand the material.”
  • Nice profile of Lego’s business culture and the tension between growth and losing track of their legacy – But the story of Lego’s renaissance — and its current expansion into new segments like virtual reality and video games — isn’t just a toy story. It’s also a reminder of how even the best brands can lose their luster but bounce back with a change in strategy and occasionally painful adaptation.

On Beyond Zebra

This article in Wired considers the vulnerabilities of supposedly theft-proof electronic systems. Turns out there are “back-doors” in some of these technologies.

He called an acquaintance who worked at a Honda dealership. I listened, awestruck, as Montes fed the guy a barely credible story about a cousin who had dropped his keys down a sewer. The dealership employee was at home but evidently could access the Honda database online. I gave Honky’s VIN to Montes, who passed it along to his friend. We soon had the prescribed sequence of pulls, which I scribbled down in my notebook.

I walked outside and approached Honky. The door lock would have been easy – a thief would have used a jiggle key, and a stranded motorist would have had a locksmith cut a fresh one. I just wrapped the grip of my key in tinfoil to jam the transponder. The key still fit, but it no longer started the car.

Then I grabbed the emergency brake handle between the front seats and performed the specific series of pumps, interspersed with rotations of the ignition between the On and Start positions. After my second attempt, Honky’s hybrid engine awoke with its customary whisper.

The story is interesting on many levels, but I was really taken by the interface to this back door. Our user model for automobile controls sees the different systems as entirely separate. Who knew the emergency brake could talk to the ignition?

I have always loved the idea of neat little tricks; unexpected ways of interacting with something, outside of the fixed rules of how you’re supposed to use it. It’s not so much the idea of unauthorized access, but simply the secret Toontown world that lurks beyond the mundane and familiar. I remember during the dial telephone era there was a way to get your own phone to ring back (it may have worked with tone, but I remember it as a dial hack); Dial 57 and the last 5 digits (or something) and then hang up, or hang up twice in succession. And the phone would ring. Great for messing with family members or when visiting someone else’s house.

The outcome was fun, but I’ll emphasize that much of the pleasure came from this possibility of navigating cleverly outside the interaction flow of receiver/dial tone/dialing/ringing/other party answering.

Sure, we’ve got Google hacks nowadays where there oodles of hidden functions, but it’s basically a command-line interface that reads more codes that you know about. So what? Isn’t that what Unix was? The delight (and I’m not talking about usefulness, just the fun and discovery) comes from the rupturing of the interaction model and the seemingly irrelevant actions leading to some new effect.

I don’t need anyone to reveal security vulnerabilities, but I’d be curious to hear about any favorite back doors!

Lego grabs ahold of customers with both hands

Great Wired piece about involving ardent fans/customers in developing future products. Clearly, having the right attitude about your customers, and a whole lot of letting go is essential to innovation (okay almost a bad pun there, sorry).

The one key difference between the four panelists and actual Lego staffers: a paycheck. For their participation, Hassenplug and his cohorts received a few Lego crane sets and Mindstorms NXT prototypes. They even paid their own airfares to Denmark. That was fine by Hassenplug. “Pretty much the comment from all four of us was ‘They’re going to talk to us about Legos, and they’re going to pay us with Legos?'” Hassenplug says. “‘They actually want our opinion?’ It doesn’t get much better than that.”

and

Some Lego executives worried that the hackers might cannibalize the market for future Mindstorms accessories or confuse potential customers looking for authorized Lego products.

After a few months of wait-and-see, Lego concluded that limiting creativity was contrary to its mission of encouraging exploration and ingenuity. Besides, the hackers were providing a valuable service. “We came to understand that this is a great way to make the product more exciting,” Nipper says. “It’s a totally different business paradigm – although they don’t get paid for it, they enhance the experience you can have with the basic Mindstorms set.” Rather than send out cease and desist letters, Lego decided to let the modders flourish; it even wrote a “right to hack” into the Mindstorms software license, giving hobbyists explicit permission to let their imaginations run wild.

Soon, dozens of Web sites were hosting third-party programs that helped Mindstorms users build robots that Lego had never dreamed of: soda machines, blackjack dealers, even toilet scrubbers. Hardware mavens designed sensors that were far more sophisticated than the touch and light sensors included in the factory kit. More than 40 Mindstorms guidebooks provided step-by-step strategies for tweaking performance out of the kit’s 727 parts.

Lego’s decision to tap this culture of innovation was a natural extension of its efforts over the past few years to connect customers to the company.

I wuz hacked

This page shows a screenshot of what portigal.com looked like earlier this week when hacked. I guess it’s a standard hack based on a weakness of some software I had installed. It was easy to restore my site and it was easy to (hopefully) block this from happening again, thanks to my ISP. I wonder if they created this page as part of their sysadminly duties or whatnot.

Series

About Steve